### [CVE-2021-30331](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30331) ![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Exposure%20in%20Data%20Modem&color=brighgreen) ### Description Possible buffer overflow due to improper data validation of external commands sent via DIAG interface in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables ### POC #### Reference - https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin #### Github No PoCs found on GitHub currently.